Exam Details

  • Exam Code
    :CEH-001
  • Exam Name
    :Certified Ethical Hacker (CEH)
  • Certification
    :GAQM certification
  • Vendor
    :GAQM
  • Total Questions
    :878 Q&As
  • Last Updated
    :Apr 24, 2024

GAQM GAQM certification CEH-001 Questions & Answers

  • Question 1:

    Vulnerability mapping occurs after which phase of a penetration test?

    A. Host scanning

    B. Passive information gathering

    C. Analysis of host scanning

    D. Network level discovery

  • Question 2:

    In which of the following should be performed first in any penetration test?

    A. System identification

    B. Intrusion Detection System testing

    C. Passive information gathering

    D. Firewall testing

  • Question 3:

    A client has approached you with a penetration test requirements. They are concerned with the possibility of external threat, and have invested considerable resources in protecting their Internet exposure. However, their main concern is the possibility of an employee elevating his/her privileges and gaining access to information outside of their respective department.

    What kind of penetration test would you recommend that would best address the client's concern?

    A. A Black Box test

    B. A Black Hat test

    C. A Grey Box test

    D. A Grey Hat test

    E. A White Box test

    F. A White Hat test

  • Question 4:

    How many bits encryption does SHA-1 use?

    A. 64 bits

    B. 128 bits

    C. 160 bits

    D. 256 bits

  • Question 5:

    There is some dispute between two network administrators at your company. Your boss asks you to come and meet with the administrators to set the record straight. Which of these are true about PKI and encryption?

    Select the best answers.

    A. PKI provides data with encryption, compression, and restorability.

    B. Public-key encryption was invented in 1976 by Whitfield Diffie and Martin Hellman.

    C. When it comes to eCommerce, as long as you have authenticity, and authenticity, you do not need encryption.

    D. RSA is a type of encryption.

  • Question 6:

    Which of the following is NOT true of cryptography?

    A. Science of protecting information by encoding it into an unreadable format

    B. Method of storing and transmitting data in a form that only those it is intended for can read and process

    C. Most (if not all) algorithms can be broken by both technical and non-technical means

    D. An effective way of protecting sensitive information in storage but not in transit

  • Question 7:

    Which of the following best describes session key creation in SSL?

    A. It is created by the server after verifying theuser's identity

    B. It is created by the server upon connection by the client

    C. It is created by the client from the server's public key

    D. It is created by the client after verifying the server's identity

  • Question 8:

    What is SYSKEY # of bits used for encryption?

    A. 40

    B. 64

    C. 128

    D. 256

  • Question 9:

    Steven the hacker realizes that the network administrator of XYZ is using syskey to protect organization resources in the Windows 2000 Server. Syskey independently encrypts the hashes so that physical access to the server, tapes, or ERDs is only first step to cracking the passwords. Steven must break through the encryption used by syskey before he can attempt to brute force dictionary attacks on the hashes. Steven runs a program called "SysCracker" targeting the Windows 2000 Server machine in attempting to crack the hash used by Syskey. He needs to configure the encryption level before he can launch attach.

    How many bits does Syskey use for encryption?

    A. 40 bit

    B. 64 bit

    C. 256 bit

    D. 128 bit

  • Question 10:

    In the context of using PKI, when Sven wishes to send a secret message to Bob, he looks up Bob's public key in a directory, uses it to encrypt the message before sending it off. Bob then uses his private key to decrypt the message and reads it. No one listening on can decrypt the message.

    Anyone can send an encrypted message to Bob but only Bob can read it. Thus, although many people may know Bob's public key and use it to verify Bob's signature, they cannot discover Bob's private key and use it to forge digital signatures.

    What does this principle refer to?

    A. Irreversibility

    B. Non-repudiation

    C. Symmetry

    D. Asymmetry

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CEH-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.